Вы находитесь на странице: 1из 2

Veritas Cluster Server 6.0 for UNIX: Administration

Duration: 3 days


High Availability Concepts

High availability concepts

Clustering concepts

HA application services

Clustering prerequisites

VCS Building Blocks

VCS terminology

Cluster communication

VCS architecture

Preparing a Site for VCS Implementation

Hardware requirements and recommendations

Software requirements and recommendations

Preparing installation information

Preparing to upgrade

Installing VCS

Using the Common Product Installer

VCS configuration files

Viewing the default VCS configuration

Veritas Operations Manager

Other installation considerations

Upgrading to 6.0

VCS Operations

Common VCS tools and operations

Service group operations

Resource operations

Using the VCS Simulator

VCS Configuration Methods

Starting and stopping VCS

Overview of configuration methods

Online configuration

Offline configuration

Controlling access to VCS

Preparing Services for High Availability

Preparing applications for VCS

Performing one-time configuration tasks

Testing the application service

Stopping and migrating an application service

Collecting configuration information

Online Configuration

Online service group configuration procedure

Adding resources

Solving common configuration errors

Testing the service group

Offline Configuration

Offline configuration procedures

Solving offline configuration problems

Testing the service group

Configuring Notification

Notification overview

Configuring notification

Using triggers for notification

Handling Resource Faults

VCS response to resource faults

Determining failover duration

Controlling fault behavior

Recovering from resource faults

Fault notification and event handling

Intelligent Monitoring Framework

IMF overview

IMF configuration

Faults and failover with intelligent monitoring

Cluster Communications

VCS communications review

Cluster membership

Cluster interconnect configuration

Joining the cluster membership

Changing the interconnect configuration

Data Protection Using SCSI 3-Based Fencing

Data protection requirements

I/O fencing concepts and components

I/O fencing operations

I/O fencing implementation

Configuring I/O fencing

Coordination Point Server

Coordination point concepts

Installing and configuration CP servers

Configuring client clusters

CPS administration

Coordination point agent